All about Cloud Computing

download (9)

Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user’s data, software […]

IT disaster recovery plan


Businesses should develop an IT disaster recovery plan. It begins by compiling an inventory of hardware (e.g. servers, desktops, laptops and wireless devices), software applications and data. The plan should include a strategy to ensure that all critical information is backed up. Identify critical software applications and data and the hardware required to run them. […]

25 Most Frequently Used Linux IPTables Rules

Hungary Ericsson Lab

1. Delete Existing Rules Before you start building new set of rules, you might want to clean-up all the default rules, and existing rules. iptables -F (or) iptables –flush 2. Set Default Chain Policies The default chain policy is ACCEPT. Change this to DROP for all INPUT, FORWARD, and OUTPUT chains iptables -P INPUT DROP […]

Email Spoofing

images (14)

Have you ever gotten an email that appeared to be from a friend or colleague (or even worse, from yourself) but the subject and text were obviously not something that he or she would send? Or have you ever gotten an undeliverable email notice for an email that you never sent out? Both of these […]

ServerMascot – On Demand IT Services


Welcome to ServerMascot. Your online store for purchasing IT services “On-Demand”.  No more worrying with maintaining a huge IT staff to manage your Hosted infrastructure, Software, Internet marketing processes. We are a 100 member team of expert engineers with more than 10 years of experiencing managing enterprise class IT systems and building business software. We […]